September 24, 2025
September 24, 2025
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike
By | | 0 Comments |
A suspected cyber espionage activity cluster that was previously found…
UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors
By | | 0 Comments |
Companies in the legal services, software-as-a-service (SaaS) providers, Business Process…
Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models
By | | 0 Comments |
Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt…
How One Bad Password Ended a 158-Year-Old Business
By | | 0 Comments |
Most businesses don't make it past their fifth birthday -…
New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus
By | | 0 Comments |
Cybersecurity researchers have disclosed details of a new malware family…
iframe Security Exposed: The Blind Spot Fueling Payment Skimmer Attacks
By | | 0 Comments |
Think payment iframes are secure by design? Think again. Sophisticated…
Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials
By | | 0 Comments |
Cloud security company Wiz has revealed that it uncovered in-the-wild…
CVE-2025-55322 OmniParser Remote Code Execution Vulnerability
By | | 0 Comments |
Binding to an unrestricted ip address in GitHub allows an…
State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability
By | | 0 Comments |
Libraesva has released a security update to address a vulnerability…